Menu
  • No products in the basket.

Ethical Hacking: Recon and Footprinting

0( 0 REVIEWS )
133 STUDENTS
Overview Footprinting and Recon (Reconnaissance) go hand-in-hand in terms of cyber security. The attack surface of a system, network, or organization is …

Overview

Footprinting and Recon (Reconnaissance) go hand-in-hand in terms of cyber security. The attack surface of a system, network, or organization is referred to as the footprint. Determining that footprint and covertly collecting information on the target is referred to as recon. The process of footprinting and recon is often used early in an attack by penetration testers. Hackers usually spend most of their time in reconning, by collecting information about the host, people and network related to the organization. On the other hand, footprinting helps in identifying the security posture, attack area, vulnerabilities and network map of an organiztion.

Cybercrimes and attacks have become very common in this modern digital world. Many organizations have started to employ ethical hackers within their organization in order to identify and prevent threats and attacks towards the organizational systems. There are currently over a million Cyber Security job openings globally, and the demand is greatly outpacing supply. A job in cyber security is the perfect career option if you look for challenges, progress and a higher pay in a job position. This course in Recon and Footprinting will help you further improve your eligibility for a job position in the cyber security and IT field. This course is for both beginners and IT pros looking to get certified and land an entry level Cyber Security job position. 

  • Why consider learning at study 365?
  • Learning outcomes
  • Access duration
  • Who is this course aimed at?
  • Entry requirements
  • Method of assessment
  • Certification and awarding body
  • Tutor info
  • Progression and career path
  • Other benefits

With so many commitments in our lives, we may not have the time to learn new skills. The beauty of studying online is that you get to find this balance between your education and your daily commitments

Study 365 offers hundreds of online courses to students across the world. Gaining new skills has never been this easy as many of our courses are open to students with little or no qualifications or previous experience. All the courses are up-to-date, relevant, affordable, and will build on existing expertise or give you a jump-start to a new career. The courses are meticulously designed and equals what is offered in a classroom setting. With a solid reputation that has established and made us made us one of the most trusted and reliable online course providers we offer the most convenient path to gain recognised skills and training that will give you the opportunity to put into practice your knowledge and expertise in your chosen career. You can learn at your own pace at Study 365 and you will be provided with all the necessary material, tutorials, qualified course instructor, narrated e-learning modules, interactive quizzes and free resources which include Free CV writing pack, free career support and course demo to make your learning experience enriching and more rewarding. 

  • Understand website and e-mail footprinting.
  • Learn about web site analysis performance and attack methods.
  • Port inspection with Netstat, Nmap and Metasploit, and Maltego.
  • How to perform a SNMP probe and SMTP inspection, and so much more!

The course will be directly delivered to you, and you have 12 months access to the online learning platform from the date you joined the course.  The course is self-paced and you can complete it in stages, revisiting the lectures at any time.

  • IT students
  • Job seekers
  • IT professionals
  • Anyone interested in learning about Recons and Footprinting 
  • Learners must be age 16 or over and
  • Should have a basic understanding of the English Language, numeracy, literacy, and ICT.
  • Should have a basic understanding of Recons and Footprinting

At the end of the course, you will have one assignment to be submitted (you need a mark of 65% to pass) and you can submit the assignment at any time. You will only need to pay £19 for assessment and certification when you submit the assignment. You will receive the results within 72 hours of submittal, and will be sent a certificate in 7-14 days if you have successfully passed.

Those who successfully complete the course will be awarded Ethical hacking: Recons and Footprinting certificate by CPD & iAP. The qualification will make you valuable to employers, and your motivation at gaining new skills will be recognised.

Chad Russell has been in the Cyber Security industry for over 15 years. He has taught Microsoft Engineering courses as a Certified trainer, managed teams of security engineers and analysts for an internet banking provider, and has been an information security consultant working for companies including SAP, Microsoft and Oracle.

He leads and conducts ‘Security Risk Assessments’ for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security, and access management.

Over the past 15 years he has held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications, and has a B.S. in Computer Science from Excelsior College. 

On the successful completion of this course in Ethical hacking: Recons and footprinting, you will be qualified for various job positions in the IT and cyber security field. This course can also help you progress in your career and to demand for job promotions and salary increments from your organization. The job positions you can use this course in, along with the average UK salary per annum according to https://www.payscale.com/career-path-planner, is given below,

  • Penetration tester – £37,002 per annum
  • Chief information officer (CIO) – £97,289 per annum
  • Chief technology officer (CTO) – £79,806 per annum
  • Head of IT and infrastructure – £57,953 per annum 
  • Written and designed by the industry’s finest expert instructors with over 15 years of experience
  • Repeat and rewind all your lectures and enjoy a personalised learning experience
  • Gain access to quality video tutorials
  • Unlimited 12 months access from anywhere, anytime
  • Save time and money on travel
  • Learn at your convenience and leisure
  • Eligible for TOTUM discount card

Course Curriculum

1: WEBSITE AND E-MAIL FOOTPRINTING
2: PORT INSPECTION WITH NETSTAT
3: NMAP AND METASPLOIT
4: MALTEGO
5: WHO IS AND NSLOOKUP
6: SHODAN AND IOT ENUMERATION
7: NTP ENUMERATION
8: PROBING SNMP
9: INSPECTING SMTP
10: SMB DISCOVERY
11: COMMONLY USED NETWORK PORTS AND PROTOCOLS

Students feedback

N.A

Avarage rating ()
5 Star
4 Star
3 Star
2 Star
1 Star

No Reviews found for this course.

Copyright © 2021 -Study365 - All rights reserved.

WhatsApp chat